Environment & Credentials
Eitherway separates configuration by environment to keep builds deterministic and secrets safe.
Environments
Local Workspace
Development servers and preview deployments
Build Runners
Temporary variables for compilation
Runtime
Production settings managed by host
Secrets Management
Best practices:
Store credentials in a dedicated vault or secret manager
Rotate keys regularly
Apply minimal access permissions
Conceal values in logging systems
Never hardcode into source control
Use distinct keys per environment and service
Naming Conventions
Recommended format:
API_URL
AUTH_ISSUER
STRIPE_KEY
FIREBASE_PROJECT
WALLETCONNECT_PROJECT
ALCHEMY_API_KEY
PINATA_JWT
Optional environment suffixes: _DEV, _STAGE, _PROD.
Required Environment Variables
ANTHROPIC_API_KEY
Claude AI
Yes
OPENAI_API_KEY
DALL-E image generation
Yes
POSTGRES_*
Database connection
Yes
PRIVY_APP_ID
Authentication
Yes
PRIVY_APP_SECRET
Authentication
Yes
ALCHEMY_API_KEY
EVM blockchain RPC
Yes (Web3)
PINATA_JWT
IPFS storage
Yes (NFTs)
WALLETCONNECT_PROJECT_ID
Wallet connection
Yes (Web3)
DEPLOYER_PRIVATE_KEY
Contract deployment
Yes (Web3)
ENCRYPTION_KEY
Credential encryption
Yes
SUPABASE_*
Backend service
Optional
Injection
Create
.env.examplefrom prompt requirements.Keep real values in a secret store.
Build runners receive scoped secrets; web hosts receive runtime secrets.

Last updated